products:

Sorry,

there are no posts to show...


Helpful Resources

News:

Type “EHR” and “information security” into Google and you will find tons of Internet websites, news articles, and even YouTube videos on touting the various plusses and minuses of electronic health records, or EHR.  In the last few years, the EHR has become the physician’s best friend, as it helps provide better care, better population health and lower heath care costs.  While EHRs might be changing the way hospitals and practice offices operate, there are still issues with using EHRs securely.   According to the HHS Office of Inspector General, nearly “60 percent of hospitals participating in the federal meaningful use incentive program reported an unplanned disruption in their record systems in 2014 and 2015.” [Note that the meaningful use program is a federally backed program designed to encourage adoption of EHRs by doctors and hospitals].  It is also important to note that most of the reported unplanned disruptions were caused by hardware failure, not from cyber attacks.  While hardware failures are a concern, cyberattacks should also be at the top of the list.  Hospitals are facing an increasing number of directed cyberattacks aimed at disrupting and disabling the IT and health record infrastructure.

Having a contingency plan in place to deal with unforeseen events, such as disruptions from hardware failure or loss of patient data because of a cyber attack will ensure that your organization can plan and be ready when the inevitable strikes.  According to the HHS report from July 2016, many of the medical practice organizations investigated, including hospitals and practice offices, followed HIPAA requirements for its contingency plans, including backing up data, having a disaster recovery plan, having an emergency-mode operation plan and testing and revising the contingency plan.  The recent cyberattacks on hospitals have had a profound effect on the security of EHRs.  Earlier this year, a hospital in California fell victim to a ransomware attack that disabled its network and EHR system for a week, which led to delayed patent care and required patients to be moved to other facilities. In March, MedStar Health reported a suspected ransomware attack that required the healthcare network to take its all of its computer systems offline.

During cyber attacks and hardware failures, healthcare organizations rely on backup data in order to return to operations quickly.  Without a contingency plan in place, cyberattacks and outages will cause major headaches for the healthcare provider.  The HIPAA Security Rule requires that covered entities protect and secure the confidentiality, integrity, and availability of electronic protected health information (ePHI), of which EHR is one of many applications that store such data.  Securing this type of data is important as its loss can be a significant financial burden on the healthcare organization.

While the report emphasizes the need for contingency plans, it does not address other areas of security requirements under HIPAA.  HIPAA is required for federal entities, and the HHS Office of Inspector General (OIG) has previously recommended that OCR “fully implement a permanent audit program to assess compliance with HIPAA requirements.”

Whatever your organization’s requirements are, let CyberSheath help you prepare for the unplanned disruption.

FAQs:

CyberSheath Blog

Dr. Robert Spalding to Address Nation-State Attacks at CMMC Con 2021

Since the inaugural CMMC Con, we’ve seen some of the most malicious attacks on American infrastructure ever executed. The SolarWinds attack reverberated across the entire government as agencies scrambled to discover what nation-state attackers had accessed and stolen. The Colonial Pipeline, shut down by a ransomware attack, led to fuel…

CMMC-AB vice chair Jeff Dalton to address CMMC Con 2021

The swiftness and severity of recent cyber attacks has dominated headlines and revealed that many organizations still don’t quite know what to do to protect themselves, as well as the businesses and government entities they’re connected to.   Ransomware attacks were a big point of discussion at the recent G7…

CMMC Con 2021 Opens Registration, Reveals Theme and Speakers

CMMC compliance stands in the way of revenue for every defense contractor in the supply chain. Now that CMMC is a reality for the Defense Industrial Base (DIB), learn how contractors — primes and subs, large and small, foreign-owned — are handling the standards and requirements, as well as the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft